Jump to content

plentyofkb

Members
  • Posts

    2
  • Joined

  • Last visited

Reputation

0 Neutral
  1. Hello all, I am new member here, so sorry if this has been a previous topic or if this post is not in the right place. My Pc got a nasty bug (mdefense.exe, and google installer error stuff) I downloaded malwarebytes form this site and did the recommended steps to make it run. I ran it and it caught three trojans which they were supposed to be deleted after rebooting the machine. I rebooted and when I run the malwarebytes.....it catches the same trojans again....i n bold letters here.... Finally I ran Malwarebytes in safe mode and I got this log file...where it catches itself as a trojan? Any help of any other step I should take to get rid of this viruses? Malwarebytes' Anti-Malware 1.43 Database version: 3506 Windows 5.1.2600 Service Pack 3 (Safe Mode) Internet Explorer 6.0.2900.5512 1/7/2010 10:55:44 AM mbam-log-2010-01-07 (10-55-44).txt Scan type: Full Scan (C:\|D:\|F:\|) Objects scanned: 276594 Time elapsed: 1 hour(s), 28 minute(s), 12 second(s) Memory Processes Infected: 0 Memory Modules Infected: 1 Registry Keys Infected: 1 Registry Values Infected: 1 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 2 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: \\?\globalroot\systemroot\system32\H8SRTwypdvwtwum.dll (Trojan.Vundo) -> Delete on reboot. Registry Keys Infected: HKEY_LOCAL_MACHINE\SOFTWARE\H8SRT (Rootkit.TDSS) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\malwarebytes anti-malware (reboot) (Trojan.Agent) -> Quarantined and deleted successfully. Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: \\?\globalroot\systemroot\system32\H8SRTwypdvwtwum.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\krl32mainweq.dll (Trojan.DNSChanger) -> Quarantined and deleted successfully.
  2. Hello all, I am new member here, so sorry if this has been a previous topic or if this post is not in the right place. My Pc got a nasty bug (mdefense.exe, and google installer error stuff) I downloaded malwarebytes form this site and did the recommended steps to make it run. I ran it and it caught three trojans which they were supposed to be deleted after rebooting the machine. I rebooted and when I run the malwarebytes.....it catches the same trojans again....i n bold letters here.... Finally I ran Malwarebytes in safe mode and I got this log file...where it catches itself as a trojan? Any help of any other step I should take to get rid of this viruses? Malwarebytes' Anti-Malware 1.43 Database version: 3506 Windows 5.1.2600 Service Pack 3 (Safe Mode) Internet Explorer 6.0.2900.5512 1/7/2010 10:55:44 AM mbam-log-2010-01-07 (10-55-44).txt Scan type: Full Scan (C:\|D:\|F:\|) Objects scanned: 276594 Time elapsed: 1 hour(s), 28 minute(s), 12 second(s) Memory Processes Infected: 0 Memory Modules Infected: 1 Registry Keys Infected: 1 Registry Values Infected: 1 Registry Data Items Infected: 0 Folders Infected: 0 Files Infected: 2 Memory Processes Infected: (No malicious items detected) Memory Modules Infected: \\?\globalroot\systemroot\system32\H8SRTwypdvwtwum.dll (Trojan.Vundo) -> Delete on reboot. Registry Keys Infected: HKEY_LOCAL_MACHINE\SOFTWARE\H8SRT (Rootkit.TDSS) -> Quarantined and deleted successfully. Registry Values Infected: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\malwarebytes anti-malware (reboot) (Trojan.Agent) -> Quarantined and deleted successfully. Registry Data Items Infected: (No malicious items detected) Folders Infected: (No malicious items detected) Files Infected: \\?\globalroot\systemroot\system32\H8SRTwypdvwtwum.dll (Trojan.Vundo) -> Quarantined and deleted successfully. C:\WINDOWS\system32\krl32mainweq.dll (Trojan.DNSChanger) -> Quarantined and deleted successfully.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.